Detection rules › Splunk

Sqlite Module In Temp Folder

Author
Teoderick Contreras, Splunk
Source
upstream

The following analytic detects the creation of sqlite3.dll files in the %temp% folder. It leverages Sysmon EventCode 11 to identify when these files are written to the temporary directory. This activity is significant because it is associated with IcedID malware, which uses the sqlite3 module to parse browser databases and steal sensitive information such as banking details, credit card information, and credentials. If confirmed malicious, this behavior could lead to significant data theft and compromise of user accounts.

MITRE ATT&CK coverage

TacticTechniques
CollectionT1005 Data from Local System

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: search

search (TargetFilename="*\\sqlite32.dll" OR TargetFilename="*\\sqlite64.dll") EventCode=11 TargetFilename="*\\temp\\*"

Stage 2: stats

stats BY action, dest, file_name, file_path, process_guid, process_id, user_id, vendor_product

Stage 3: search

search

Stage 4: search

search

Stage 5: search

search `macro`

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventCodeeq
  • 11 corpus 10 (splunk 10)
TargetFilenameeq
  • "*\\sqlite32.dll"
  • "*\\sqlite64.dll"
  • "*\\temp\\*" corpus 4 (splunk 4)